Sciweavers

2517 search results - page 319 / 504
» Secure Deployment of Components
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ESAW
2009
Springer
14 years 3 months ago
Balancing Organizational Regulation and Agent Autonomy: An MDE-Based Approach
Abstract. The deployment of agent societies —as complex systems— in dynamic and unpredictable settings brings forth critical issues concerning their design. Organizational mode...
Loris Penserini, Virginia Dignum, Athanasios Staik...
APSEC
2008
IEEE
14 years 3 months ago
Flexible Generation of Pervasive Web Services Using OSGi Declarative Services and OWL Ontologies
There is a growing trend to deploy web services in pervasive computing environments. Implementing web services on networked, embedded devices leads to a set of challenges, includi...
Klaus Marius Hansen, Weishan Zhang, João Fe...
ICRA
2008
IEEE
201views Robotics» more  ICRA 2008»
14 years 3 months ago
Hierarchical distributed control for search and tracking by heterogeneous aerial robot networks
Abstract—This paper presents a hierarchical control architecture that enables cooperative surveillance by a heterogeneous aerial robot network comprised of mothership unmanned ai...
Jack Elston, Eric W. Frew
SIPS
2008
IEEE
14 years 3 months ago
Efficient data flow variable length decoding implementation for the MPEG reconfigurable video coding framework
In 2004, ISO/IEC SC29 better known as MPEG started a new standard initiative aiming at facilitating the deployment of multi-format video codec design and to enable the possibility...
Jianjun Li, Dandan Ding, Christophe Lucarz, Samuel...